Journal articles on the topic 'Internet Servers'

To see the other types of publications on this topic, follow the link: Internet Servers.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet Servers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kant, Krishna, and Prasant Mohapatra. "Scalable internet servers." ACM SIGMETRICS Performance Evaluation Review 28, no. 2 (September 2000): 5–8. http://dx.doi.org/10.1145/362883.362891.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mishra, Swati, and Sanjaya Kumar Panda. "An Efficient Server Minimization Algorithm for Internet Distributed Systems." International Journal of Rough Sets and Data Analysis 4, no. 4 (October 2017): 17–30. http://dx.doi.org/10.4018/ijrsda.2017100102.

Full text
Abstract:
The increasing use of online services leads to an unequal distribution of the loads among the servers. As a result, the problem is to balance the loads among the servers such that the total number of active servers is minimized. One of the possible solutions is to transfer the loads from the underutilized server to a suitable server and make the underutilized server to sleep mode. In this paper, a server minimization algorithm (SMA) is proposed for the solution of server minimization and the load balancing problem. The proposed algorithm reduces the number of servers by merging the loads of the two least loaded servers. Then it determines the standard deviation of the server loads for load balancing. The proposed SMA is compared with an existing load balancing algorithm using the number of minimized servers, load standard deviation and load factor. The simulation results show the efficacy of the SMA.
APA, Harvard, Vancouver, ISO, and other styles
3

Ju, Hong Yao, and Xin Wang. "Research on the Model of the Internet of Things Servers Group Automatic Expandability Management and Control." Advanced Materials Research 482-484 (February 2012): 2070–75. http://dx.doi.org/10.4028/www.scientific.net/amr.482-484.2070.

Full text
Abstract:
The internet of things automatic expandability management and control technology are a key technology,which include adjusting member server numbers immediately according to load of servers group,optimizing internet of things servers system performance,making the system response time become fast,and making servers system energy consumption decrease.With the integrated technology research of detecting servers load,expandability management and control,load balance and so on ,the problem ,which is the internet of things servers group numbers are increased or decreased automatically when the internet of things servers load is too heavy or too light,is solved, servers group intelligent expandability and servers group intelligent load balance are realized.With system test,servers system performances and response times are improved obviously.
APA, Harvard, Vancouver, ISO, and other styles
4

Ma, Rong. "Edge Server Placement for Service Offloading in Internet of Things." Security and Communication Networks 2021 (September 30, 2021): 1–16. http://dx.doi.org/10.1155/2021/5109163.

Full text
Abstract:
With the rapid development of the Internet of Things, a large number of smart devices are being connected to the Internet while the data generated by these devices have put unprecedented pressure on existing network bandwidth and service operations. Edge computing, as a new paradigm, places servers at the edge of the network, effectively relieving bandwidth pressure and reducing delay caused by long-distance transmission. However, considering the high cost of deploying edge servers, as well as the waste of resources caused by the placement of idle servers or the degradation of service quality caused by resource conflicts, the placement strategy of edge servers has become a research hot spot. To solve this problem, an edge server placement method orienting service offloading in IoT called EPMOSO is proposed. In this method, Genetic Algorithm and Particle Swarm Optimization are combined to obtain a set of edge server placements strategies, and Simple Additive Weighting Method is utilized to determine the most balanced edge server placement, which is measured by minimum delay and energy consumption while achieving the load balance of edge servers. Multiple experiments are carried out, and results show that EPMOSO fulfills the multiobjective optimization with an acceptable convergence speed.
APA, Harvard, Vancouver, ISO, and other styles
5

Praveen Misra and Rajeev Yadav. "An experimental study for the performance assessment of the DNS server architecture on IPv6 network." World Journal of Advanced Research and Reviews 17, no. 1 (January 30, 2023): 699–710. http://dx.doi.org/10.30574/wjarr.2023.17.1.0011.

Full text
Abstract:
In this paper, an experimental investigation is conducted to study the performance of the educational research domain name system (ER-DNS) hierarchical server network which works on internet protocol version 6 (IPv6) only, instead of the publicly available dual stack DNS root servers on the internet. There is a high probability of making the entire internet system unstable if any changes are made. Thus, we have created the experimental testbed, which functions similar to the existing live internet systems. It thus gives more flexibility to experiment and make technical and operational changes, without risking the stability and reliability of the internet system. In this paper, we have setup the entire DNS hierarchy starting from the root to the recursive servers with the top level domain (TLD) and domain authoritative name servers has been setup. This setup enables the queries to flow from the end user recursive servers to the domain authoritative server via the root as well as the TLD servers and provide the result to the end user. Query response in each of these servers were recorded to derive the response time, failure and successes to help in assessing the efficiency, behavior, functionality, stability and reliability of the ER-DNS architecture in IPv6 networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Condliffe, Jamie. "Smart servers thwart internet attackers." New Scientist 209, no. 2797 (January 2011): 20. http://dx.doi.org/10.1016/s0262-4079(11)60200-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Akmalia, Gina, Elvyna Tunggawan, Kevin Sungiardi, and Alfian Lazuardi. "Distributed Proxy Server dengan Squid pada Sistem Operasi Windows 7." Jurnal ULTIMA InfoSys 4, no. 2 (December 1, 2013): 74–78. http://dx.doi.org/10.31937/si.v4i2.242.

Full text
Abstract:
Proxy server is the intermediary between client and the Internet. The usage of proxy server is one of many means to avoid excessive access to the Internet. Proxy server’s cache will save every web page which has been accessed, so clients can save their bandwidth when they access same web pages repeatedly. Distributed proxy is a collection of connected proxy servers which has shared cache. This research will prove that distributed proxy server can shorten data access time and minimize bandwidth. On this research, we use Squid Proxy Server on Windows 7 as the main tool. Index Terms - distributed proxy, shared cache, Squid
APA, Harvard, Vancouver, ISO, and other styles
8

Jul, Eric, Povl Koch, Jørgen S. Hansen, Michael Svendsen, Kim Henriksen, Kenn Nielsen, and Mads Dydensborg. "High-performance cluster-based Internet servers." ACM SIGOPS Operating Systems Review 34, no. 2 (April 2000): 38. http://dx.doi.org/10.1145/346152.346264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kant, K., and Prasant Mohapatra. "Current research trends in internet servers." ACM SIGMETRICS Performance Evaluation Review 29, no. 2 (September 2001): 5–7. http://dx.doi.org/10.1145/572317.572318.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Collinson, Helen. "IBM unveils web servers, internet firewall." Computers & Security 14, no. 7 (January 1995): 616. http://dx.doi.org/10.1016/0167-4048(96)81704-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Yue Luo, J. Rubio, L. K. John, P. Seshadri, and A. Mericas. "Benchmarking internet servers on superscalar machines." Computer 36, no. 2 (February 2003): 34–40. http://dx.doi.org/10.1109/mc.2003.1178044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Fukatsu, Tokihiro, and Masayuki Hirafuji. "Field Monitoring Using Sensor-Nodes with a Web Server." Journal of Robotics and Mechatronics 17, no. 2 (April 20, 2005): 164–72. http://dx.doi.org/10.20965/jrm.2005.p0164.

Full text
Abstract:
In order to realize field and environment monitoring over long periods, we propose remote monitoring that responds flexibly and dynamically to change. Field Servers are one of the small monitoring sensor-nodes having a Web server accessed via the Internet and using a wireless LAN to provide a high-speed transmission network differing from traditional sensor-nodes. Monitoring with Field Servers enables easy installation, monitoring field information, and remote operation in any field. By providing a Web server for all modules, we can treat them collectively via the Internet. To evaluate this monitoring, we managed numerous Field Servers in different countries using an agent program. Field experiments show the system is safe and effective for remote monitoring applications.
APA, Harvard, Vancouver, ISO, and other styles
13

Trepalin, Sergei V., and Alexander V. Yarkov. "CheD: Chemical Database Compilation Tool, Internet Server, and Client for SQL Servers." Journal of Chemical Information and Computer Sciences 41, no. 1 (December 14, 2000): 100–107. http://dx.doi.org/10.1021/ci000039n.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Guyton, James D., and Michael F. Schwartz. "Locating nearby copies of replicated Internet servers." ACM SIGCOMM Computer Communication Review 25, no. 4 (October 1995): 288–98. http://dx.doi.org/10.1145/217391.217463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Xiangping Chen and P. Mohapatra. "Performance evaluation of service differentiating Internet servers." IEEE Transactions on Computers 51, no. 11 (November 2002): 1368–75. http://dx.doi.org/10.1109/tc.2002.1047760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Alharbi, Fawaz, and Mustafa Mustafa. "Two-Tier Load Balancer as a Solution to a Huge Number of Servers." Journal of Engineering and Applied Sciences 9, no. 1 (2022): 1. http://dx.doi.org/10.5455/jeas.2022050101.

Full text
Abstract:
High number of users, connected devices and services on the Internet producing high traffic and load on the web servers causes a degradation of the quality of Internet services. A possible solution to this problem is to use a cluster of web servers. The cluster requires a load balancer to provide scalability and high performance of the services offered. The main load balancer is the only entry point to the server cluster in this architecture. In this paper, the researchers propose a two-tier load balancer rather than a single one to achieve more scalability and reduce the load on the main load balancer. The study also compared three features, Response Time Average, the load balancer CPU Utilization, and Servers’ CPU Utilization. The comparison uses three algorithms (Round Robin, Number of Connections, and Least Load) through two experiments. The results concluded that the Multi-Tier Load Balancing method offered better CPU utilization than a Single-Tier Load Balancing method for Round Robin and Server Load algorithms. However, the Single-Tier Load Balancing method provided better response time for all three algorithms. Moreover, the Round Robin and Server Load algorithms using a Multi-Tier method balanced the CPU utilization for all servers. This result shows the Multi-Tier method handles huge traffic and large number of servers with better CPU utilization.
APA, Harvard, Vancouver, ISO, and other styles
17

Panda, Sanjaya Kumar, Swati Mishra, and Satyabrata Das. "An Efficient Intra-Server and Inter-Server Load Balancing Algorithm for Internet Distributed Systems." International Journal of Rough Sets and Data Analysis 4, no. 1 (January 2017): 1–18. http://dx.doi.org/10.4018/ijrsda.2017010101.

Full text
Abstract:
The growing popularity of Internet Distributed System has drawn enormous attention in business and research communities for handling large number of client requests. These requests are managed by a set of servers. However, the requests may not be equally distributed due to their random nature of arrivals. The optimal assignment of the requests to the servers is a well-known NP-hard problem. Therefore, many algorithms have been proposed to address this problem. However, these algorithms suffer from an excessive number of comparisons. In this paper, a Swapping-based Intra- and inter-Server (SIS) load balancing with padding algorithm is proposed for its solution. The algorithm undergoes a three-phase process to balance the loads among the servers. The proposed algorithm is compared with a client-server load balancing algorithm and the performance is measured in terms of the number of load comparisons and load factor. The simulation outcomes show the efficacy of the proposed algorithm.
APA, Harvard, Vancouver, ISO, and other styles
18

Mendel, Alan. "PDM and the Internet." Mechanical Engineering 121, no. 09 (September 1, 1999): 60–63. http://dx.doi.org/10.1115/1.1999-sep-3.

Full text
Abstract:
Internet technology is reshaping the product data management (PDM) software business. Product data management on the Internet is a natural extension of this distributed arrangement. The Web browser essentially becomes a new kind of client, one that's uniform across all applications. Currently, most PDM servers are simply not configured to handle so many concurrent users, and the processing burden assumed by the client in the client/ server system shifts to the server in a browser-based system. One of the main reasons for the increase in Internet activity for PDM is the success of the World Wide Web throughout society and business. The primary security mechanism currently used on PDM systems is the use of passwords that identify users, telling the system what each person can see or change. While client/ server systems maintain state, Internet communication between a browser and a host typically is stateless; that is, once the server satisfies the request for data from the browser, it completely forgets about the existence of the browsers and maintains no pointers linking the user to the on-line database.
APA, Harvard, Vancouver, ISO, and other styles
19

Pratama, Hary Satria, Toibah Umi Kalsum, and Hendri Alamsyah. "The Implementation of Internet-Based Computer Network at SMP Negeri 21 Central Bengkulu." Jurnal Komputer, Informasi dan Teknologi (JKOMITEK) 1, no. 2 (December 1, 2021): 174–79. http://dx.doi.org/10.53697/jkomitek.v1i2.220.

Full text
Abstract:
This study aims to design and build a computer network connection at SMP Negeri 21 Central Bengkulu. This study used an experimental research method. In this study, was carried out the performance of a proxy running on the system. From the results of the analysis, conclusions will be obtained regarding the benefits and more detailed functions of Mikrotik and SMB servers in the data or file sharing function. The results of this study show that the internet network has been running in accordance with what the writer hopes and can access the internet, clients from this server can also access the internet. As well as sending files using SMB server that has been determined by the writer. The SMB server can be used to send files that are placed on the Mikrotik router, so that the files can be accessed by connected to clients. Therefore in this study the writer only built LAN network using Mikrotik and sharing data with SMB Servers only.
APA, Harvard, Vancouver, ISO, and other styles
20

Mauro-Flude, Nancy, and Yoko Akama. "A feminist server stack: co-designing feminist web servers to reimagine Internet futures." CoDesign 18, no. 1 (January 2, 2022): 48–62. http://dx.doi.org/10.1080/15710882.2021.2021243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Yudhana, Anton, Imam Riadi, and Sri Suharti. "Distributed Denial of Service (DDoS) Analysis on Virtual Network and Real Network Traffic." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 5, no. 1 (July 16, 2021): 112–21. http://dx.doi.org/10.31289/jite.v5i1.5344.

Full text
Abstract:
Data communication, computers and computer networks increase the needs and facilitation offered by a variety of server services that are owned by individuals and companies. Servers are the core of continuous communication on the internet and the main factor in the life, development and death of individual businesses or companies that rely on the internet. The other side is also developing rapidly targeting server attacks from starting to weaken performance to crippled, the most popular in the hacker world, namely attacks by bombarding servers with many requests from one computer or more, with one machine to thousands of machines. This study implements several DDoS attack techniques targeted at virtual servers and real servers to determine the type of protocol used and its accuracy and reliability. The research method uses the concept of Robert Maribe Branch (2009) or ADDIE which consists of Analysis, Design, Development, Implementation and Evaluation with the results of successful attacks on the HTTP header on the virtual network and on the real network 85.68%, while the TCP has an accuracy value. 87.75% and the real network produces 90.02%. In addition, the attack using the ping of death on the virtual server was successfully carried out and the real server had an accuracy value of 41.45% so that the attack on the TCP protocol was declared very effective in crippling the target PC or server. Â
APA, Harvard, Vancouver, ISO, and other styles
22

Zuhroni, Fajar, Adian Fatchur Rochim, and Eko Didik Widianto. "Analisis Performansi Layanan Kluster Server Menggunakan Penyeimbang Beban dan Virtual Box." Jurnal Teknologi dan Sistem Komputer 3, no. 4 (October 20, 2015): 530. http://dx.doi.org/10.14710/jtsiskom.3.4.2015.530-535.

Full text
Abstract:
Today, the growth of technology is very fast causes people more familiar with the Internet. Web servers are required to more quickly in order to serve a number of user request. Technology uses a single server is underprivileged to handle the load on the web server traffic as the number of users increases, causing the server to fail in serving the request. Technology on cluster server with load balancer is used in order to divide the load evenly so that optimize performance on a web server. Server cluster systems that are designed using six virtual machines using VirtualBox application. Six virtual machine consists of two load balancer servers, two application servers and two database servers. Definition of the system created by outlining system requirements and network topology. System design describes requirements specification of the hardware and software. Analysis and testing conducted to determine the performance of the system designed. Analysis and testing conducted to determine the performance of the system designed. Results of this research is the design of virtual servers that can serve a number of user request. Test result showed maximum ability to serve when all servers are up reach 240 connection, one of the aplication server down is 180 connection and one of the database down is 220.The optimal result when all servers up is 180 connections, one of the aplication server down is 150 connections and when database server down is 160 connections.
APA, Harvard, Vancouver, ISO, and other styles
23

ELLIOTT, STEPHEN J., and ROBYN C. ELLIOTT. "Internet List Servers and Pediatrics: Newly Emerging Legal and Clinical Practice Issues." Pediatrics 97, no. 3 (March 1, 1996): 399–400. http://dx.doi.org/10.1542/peds.97.3.399.

Full text
Abstract:
The Internet is an electronic communications network that spans the globe, and is commonly used to disseminate information relevant to medicine. Many issues resulting from the use of the Internet for medical purposes have never required consideration before. For example, citations that refer to Internet sources (eg, References 3-5 below) have yet to be standardized by the American Medical Association or the British Medical Association. The Internet list server devoted to topics in neonatology has been operational for more than 1 year. A useful analogy to a list server might be the editorial correspondence section of a journal. In the case of list servers, however, a message posted by an author to the list server is electronically and automatically mailed to all subscribers and is neither peer reviewed nor edited.
APA, Harvard, Vancouver, ISO, and other styles
24

Leng, Yajing, Ming Wang, Bowen Ma, Ying Chen, and Jiwei Huang. "A Game-Based Scheme for Resource Purchasing and Pricing in MEC for Internet of Things." Security and Communication Networks 2021 (November 12, 2021): 1–10. http://dx.doi.org/10.1155/2021/1951141.

Full text
Abstract:
Mobile edge computing (MEC) is emerging as a promising paradigm to support the applications of Internet of Things (IoT). The edge servers bring computing resources to the edge of the network, so as to meet the delay requirements of the IoT devices’ service requests. At the same time, the edge servers can gain profit by leasing computing resources to IoT users and realize the allocation of computing resources. How to determine a reasonable resource leasing price for the edge servers and how to determine the number of resource purchased by users with different needs is a challenging problem. In order to solve the problem, this paper proposes a game-based scheme for resource purchasing and pricing aiming at maximizing user utility and server profit. The interaction between users and the edge servers is modeled based on Stackelberg game theory. The properties of incentive compatibility and envy freeness are theoretically proved, and the existence of Stackelberg equilibrium is also proved. A game-based user resource purchasing algorithm called GURP and a game-based server resource pricing algorithm called GSRP are proposed. It is theoretically proven that solutions of the proposed algorithms satisfy the individual rationality property. Finally, simulation experiments are carried out, and the experimental results show that the GURP algorithm and the GSRP algorithm can quickly converge to the optimal solutions. Comparison experiments with the benchmark algorithms are also carried out, and the experimental results show that the GURP algorithm and the GSRP algorithm can maximize user utility and server profit.
APA, Harvard, Vancouver, ISO, and other styles
25

Syafrizal, Muhammad, Fahrizal Fahrizal, and Omar Pahlevi. "LOAD BALANCING DENGAN METODE HSRP UNTUK MENINGKATKAN AKSES LAYANAN SERVER PT. TELEKOMUNIKASI INDONESIA Tbk." JEIS : Jurnal Elektro dan Informatika Swadharma 3, no. 1 (January 31, 2023): 42–48. http://dx.doi.org/10.56486/jeis.vol3no1.291.

Full text
Abstract:
Management of information technology (IT) services in every organization becomes very important nowadays. Matching service availability with company needs is a basic value in determining the performance of the IT department. Making risk-based planning is a way to get a priority scale in determining corrective actions to be taken. By identifying risks, registering risks, and assessing risks that cause network service disruption based on the frequency of risk events and the severity/loss level if the risk occurs, a program plan is obtained to follow up (Risk treatment plan). Problems with network availability such as disconnection, unable to access servers, and busy servers due to overloaded access are problems that occur in the internal network of PT. Telekomunikasi Indonesia Tbk. By implementing a load balancing configuration using the HSRP method, you can add network backups to the internet and servers thereby increasing the availability of access services to servers and the internet when the network is busy and when an incident occurs when one of the networks is disconnected. To increase the capacity of the database server service, a switch port mirroring configuration is implemented as a database backup.Manajemen layanan teknologi informasi (TI) dalam setiap organisasi menjadi sangat penting saat ini. Menyesuaikan ketersediaan layanan dengan kebutuhan perusahaan menjadi nilai dasar dalam menentukan kinerja departemen TI. Membuat perencanaan berbasis risiko (Risk Base Thinking) merupakan cara untuk mendapatkan skala prioritas dalam menentukan tindakan perbaikan yang akan diambil. Dengan mengidentifikasi risiko, meregistrasi risiko, menilai/assess risiko yang menyebabkan gangguan layanan jaringan berdasarkan frekuensi kejadian risiko dan tingkat keparahan/ kerugian jika risiko itu terjadi, didapatkan rencana program untuk menindak lanjuti (Risk treatment plan). Permasalahan ketersediaan jaringan seperti terputusnya koneksi, tidak dapat akses ke server dan server sibuk akibat kelebihan beban akses merupakan permasalahan yang terjadi di jaringan internal kantor PT. Telekomunikasi Indonesia Tbk. Dengan menerapkan konfigurasi load balancing menggunakan metode HSRP dapat menambahkan backup jaringan ke internet dan server sehingga meningkatkan ketersediaan layanan akses ke server dan internet pada saat jaringan sibuk dan saat terjadi insiden terputusnya salah satu jaringan. Untuk meningkatkan kapasitas layanan server basis data diterapkan konfigurasi switch port mirroring sebagai backup basis data.
APA, Harvard, Vancouver, ISO, and other styles
26

Norberg, Stefan. "Securing Windows NT/2000 Servers for the Internet." EDPACS 29, no. 1 (July 2001): 13. http://dx.doi.org/10.1201/1079/43270.29.1.20010701/30410.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Arlitt, Martin F., and Carey L. Williamson. "A workload characterization study of Internet Web servers." ACM SIGAPP Applied Computing Review 3, no. 2 (October 1995): 1–4. http://dx.doi.org/10.1145/228228.228229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Arlitt, M. F., and C. L. Williamson. "Internet Web servers: workload characterization and performance implications." IEEE/ACM Transactions on Networking 5, no. 5 (1997): 631–45. http://dx.doi.org/10.1109/90.649565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Cline, Gregory P. "Internet Firewall Servers Address Burning Corporate Security Issues." International Journal of Network Management 5, no. 4 (July 1995): 230–32. http://dx.doi.org/10.1002/nem.4560050412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Zeebaree, Subhi Rafeeq, Karwan Fahmi Jacksi, and Rizgar Ramadhan Zebari. "Impact analysis of SYN flood DDOS attack on HAPROXY and NLB cluster-base web servers." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 1 (July 1, 2020): 505. http://dx.doi.org/10.11591/ijeecs.v19.i1.pp505-512.

Full text
Abstract:
<p>In recent, the high available internet service is main demand of the most people. However, online services occasionally become inaccessible due to various threats and attacks. Synchronization (SYN) flood Distributed Denial of Service (DDoS) is the most used and has a serious effect on the public network services. Hence, the outcome of this attack on the commonly utilized cluster-based web servers is systematically illustrated in this paper. Moreover, performance of Internet Information Service 10.0 (IIS 10.0) on Windows server 2016 and Apache 2 on Linux Ubuntu 16.04 server is evaluated efficiently. The performance measuring process is done on both Network Load Balancing (NLB) and High Available Proxy (HAProxy) in Windows and Linux environments respectively as methods for web server load balancing. Furthermore, stability, efficiency and responsiveness of the web servers are depended as the study evaluation metrics. Additionally, average CPU usage and throughput of the both mechanisms are measured in the proposed system. The results show that the IIS 10.0 cluster-based web servers are more responsiveness, efficiency and stable with and without SYN flood DDoS attack. Also, the performance of IIS 10.0 web server is better than of the Apache 2 in term of the average CPU usage and throughput.</p>
APA, Harvard, Vancouver, ISO, and other styles
31

Trepalin, Sergei V., and Alexander V. Yarkov. "ChemInform Abstract: CheD: Chemical Database Compilation Tool, Internet Server, and Client for SQL Servers." ChemInform 32, no. 20 (May 15, 2001): no. http://dx.doi.org/10.1002/chin.200120218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Katayama, Yukiko, and Takuji Tachibana. "Optimal Task Allocation Algorithm Based on Queueing Theory for Future Internet Application in Mobile Edge Computing Platform." Sensors 22, no. 13 (June 25, 2022): 4825. http://dx.doi.org/10.3390/s22134825.

Full text
Abstract:
For 5G and future Internet, in this paper, we propose a task allocation method for future Internet application to reduce the total latency in a mobile edge computing (MEC) platform with three types of servers: a dedicated MEC server, a shared MEC server, and a cloud server. For this platform, we first calculate the delay between sending a task and receiving a response for the dedicated MEC server, shared MEC server, and cloud server by considering the processing time and transmission delay. Here, the transmission delay for the shared MEC server is derived using queueing theory. Then, we formulate an optimization problem for task allocation to minimize the total latency for all tasks. By solving this optimization problem, tasks can be allocated to the MEC servers and cloud server appropriately. In addition, we propose a heuristic algorithm to obtain the approximate optimal solution in a shorter time. This heuristic algorithm consists of four algorithms: a main algorithm and three additional algorithms. In this algorithm, tasks are divided into two groups, and task allocation is executed for each group. We compare the performance of our proposed heuristic algorithm with the solution obtained by three other methods and investigate the effectiveness of our algorithm. Numerical examples are used to demonstrate the effectiveness of our proposed heuristic algorithm. From some results, we observe that our proposed heuristic algorithm can perform task allocation in a short time and can effectively reduce the total latency in a short time. We conclude that our proposed heuristic algorithm is effective for task allocation in a MEC platform with multiple types of MEC servers.
APA, Harvard, Vancouver, ISO, and other styles
33

Sierra-Fernandez, Jose María, Olivia Florencias-Oliveros, Manuel Jesús Espinosa-Gavira, José Carlos Palomares-Salas, Agustín Agüera-Pérez, and Juan José González-de-la-Rosa. "Reconfigurable Web-Interface Remote Lab for Instrumentation and Electronic Learning." International Journal of Online and Biomedical Engineering (iJOE) 16, no. 14 (November 30, 2020): 69. http://dx.doi.org/10.3991/ijoe.v16i14.16951.

Full text
Abstract:
Lab sessions in engineering education are designed to reinforce theoretical concepts. However, usually there are not enough time to reinforce all of them. Remote and virtual lab give students more time for reinforce those concepts. In particular, with remote labs, this can be done interacting with real lab equipment and specific configurations. This work proposes a flexible configuration for Remote Lab Sessions, based on some of 2019 most popular programming languages (Python and JavaScript). This configuration needed minimal network privileges, it is easily to scale and reconfigure. Its structure is based on a unique Reception-Server (which hosts User database, and Time Shift Manager, it is accessible from The Internet, and connect Users with Instruments-Servers) and some Instrument-Servers (which manage hardware connection and host experiences). Users always connect to Reception-Server, and book a shift for an experience. During the time range associate to that shift, User is internally forwarded to Instrument-Server associated with selected experience, so User is still connected to Reception-Serer. In this way, Reception-Server acts as a firewall, protecting Instrument-Servers, which never are open to The Internet. A triple evaluation system is implemented, User session logging and auto-evaluation (objectives accomplished) a knowledge test and an interaction survey. An experience is implemented, controlling a DC source using Standard Commands for Programmable Instruments.
APA, Harvard, Vancouver, ISO, and other styles
34

Sistrunk, L. A. "1049 COMPUTER RESOURCES AVAILABLE TO HORTICULTURISTS ON INTERNET." HortScience 29, no. 5 (May 1994): 578f—579. http://dx.doi.org/10.21273/hortsci.29.5.578f.

Full text
Abstract:
Internet is one of the main components of the information superhighway. By accessing information on networks, we as professionals can add to the information stream and disseminate research data and academic applications in a timely manner. Users worldwide can use this data to add to their ongoing research efforts. Both binary and ASCII files can be transmitted. One of the main obstacles new users must face is locating the proper area of interest. The use of FTP (File Transfer Protocol) allows users to transfer data between their server and other servers on Internet. For help in finding areas of interest there are two common systems being used. One is called Archie and allows the searching of Archie servers with key words. Substring searches can be used if you do not know the exact name of a resource. Another system is called Gopher and is menu driven. Gopher provides an easier way to search for the information you are looking for, since it allows users to move within modular menu components. LISTSERV, a mail manager system, allows the distribution of information by mailing lists in less time than regular Internet mail programs, further adding to the system efficiency.
APA, Harvard, Vancouver, ISO, and other styles
35

Subandri, Subandri, and Sabar Hanadwiputra. "PENERAPAN TEKNOLOGI CACHE SERVER BERBASIS IoT DENGAN RASPBERRY Pi3 MENGGUNAKAN METODE FORWARD CHAINNING." KILAT 7, no. 2 (November 21, 2018): 169–77. http://dx.doi.org/10.33322/kilat.v7i2.360.

Full text
Abstract:
With the rapid technological development, the growing number of Internet clients over time, the internet access response is slow and it takes filtering of a few websites that can harm users. For that required cache proxy server to speed up internet access time and website filtering. The use of proxy servers usually still use the standard configuration on the proxy server. This configuration can be set or modified (tuning) in such a way as to create a proxy server that is reliable and have better performance. The play on the proxy server is done by changing some parameters that are inside the proxy server application and adapted to the needs of usage on the internet network. The application used to create this proxy server is squid that runs on raspberry pi3 with a rasbian operating system. Squid applications are mostly used in local and internet networks for storing web cache, blocking multiple websites, managing bandwidth up to access restrictions.
APA, Harvard, Vancouver, ISO, and other styles
36

Kadhim, Abrar Saad, and Mehdi Ebady Manaa. "Hybrid load-balancing algorithm for distributed fog computing in internet of things environment." Bulletin of Electrical Engineering and Informatics 11, no. 6 (December 1, 2022): 3462–70. http://dx.doi.org/10.11591/eei.v11i6.4127.

Full text
Abstract:
Fog computing is a novel idea created by Cisco that provides the same capabilities as cloud computing but close to objects to improve performance, such as by minimizing latency and reaction time. Packet failure can happen on a single fog server across a large number of messages from internet of things (IoT) sensors due to several variables, including inadequate bandwidth and server queue capacity. In this paper, a fog-to-server architecture based on the IoT is proposed to solve the problem of packet loss in fog and servers using hybrid load balancing and a distributed environment. The proposed methodology is based on hybrid load balancing with least connection and weighted round robin algorithms combined together in fog nodes to take into consideration the load and time to distribute requests to the active servers. The results show the proposed system improved network evaluation parameters such as total response time of 131.48 ms, total packet loss rate of 15.670%, average total channel idle of 99.55%, total channel utilization of 77.44%, average file transfer protocol (FTP) file transfer speed (256 KB to 15 MB files) of 260.77 KB/sec, and average time (256 KB to 15 MB) of 19.27 sec.
APA, Harvard, Vancouver, ISO, and other styles
37

Nakrani, Sunil, and Craig Tovey. "From honeybees to Internet servers: biomimicry for distributed management of Internet hosting centers." Bioinspiration & Biomimetics 2, no. 4 (October 16, 2007): S182—S197. http://dx.doi.org/10.1088/1748-3182/2/4/s07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Adiwal, Sanjay, Balaji Rajendran, and Pushparaj Shetty D. "A Quantitative Method for Measuring Health of Authoritative Name Servers." International Journal of Information Security and Privacy 16, no. 1 (January 2022): 1–19. http://dx.doi.org/10.4018/ijisp.285582.

Full text
Abstract:
The Domain Name System - DNS is regarded as one of the critical infrastructure component of the global Internet because a large-scale DNS outage would effectively take a typical user offline. Therefore, the Internet community should ensure that critical components of the DNS ecosystem - that is, root name servers, top-level domain registrars and registries, authoritative name servers, and recursive resolvers - function smoothly. To this end, the community should monitor them periodically and provide public alerts about abnormal behavior. The authors propose a novel quantitative approach for evaluating the health of authoritative name servers – a critical, core, and a large component of the DNS ecosystem. The performance is typically measured in terms of response time, reliability, and throughput for most of the Internet components. This research work proposes a novel list of parameters specifically for determining the health of authoritative name servers: DNS attack permeability, latency comparison, and DNSSEC validation.
APA, Harvard, Vancouver, ISO, and other styles
39

Cho, Yeongpil, Oparin Mikhail, Yunheung Paek, and Kwangman Ko. "Energy-Reduction Offloading Technique for Streaming Media Servers." Mobile Information Systems 2016 (2016): 1–7. http://dx.doi.org/10.1155/2016/7462821.

Full text
Abstract:
Recent growth in popularity of mobile video services raises a demand for one of the most popular and convenient methods of delivering multimedia data, video streaming. However, heterogeneity of currently existing mobile devices involves an issue of separate video transcoding for each type of mobile devices such as smartphones, tablet PCs, and smart TVs. As a result additional burden comes to media servers, which pretranscode multimedia data for number of clients. Regarding even higher increase of video data in the Internet in the future, the problem of media servers overload is impending. To struggle against the problem an offloading method is introduced in this paper. By the use of SorTube offloading framework video transcoding process is shifted from the centralized media server to the local offloading server. Thus, clients can receive personally customized video stream; meanwhile the overload of centralized servers is reduced.
APA, Harvard, Vancouver, ISO, and other styles
40

He, Hui, Yana Feng, Zhigang Li, Zhenguang Zhu, Weizhe Zhang, and Albert Cheng. "Dynamic load balancing technology for cloud-oriented CDN." Computer Science and Information Systems 12, no. 2 (2015): 765–86. http://dx.doi.org/10.2298/csis141104025h.

Full text
Abstract:
With soaring demands of Internet content services, content delivery network (CDN), one of the most effective content acceleration techniques, is applied into Internet services. Content routing functions in CDN are generally realized by load balancing system. Effectiveness of load balancing strategy determines response speed to users and user experience (UE) directly. This paper extracted the most important influencing factor of CDN loading from common network services and proposed the Variable Factor Weighted Least Connection. The proposed algorithm made real-time computing and dynamic regulation in considering of effect of network applications on server load index, performance changes of the server and workload changes. It has been applied in LVS kernel system successfully. The experiment confirmed that the CDN load schedule system with Variable-Factor-Weighted-Least-Connection could balance loads among cluster servers dynamically according to processing capacity changes of servers, thus enabling to provide users desired services and contents during high large-scale concurrence accesses of users.
APA, Harvard, Vancouver, ISO, and other styles
41

Arlitt, Martin F., and Carey L. Williamson. "Trace-Driven Simulation of Document Caching Strategies for Internet Web Servers." SIMULATION 68, no. 1 (January 1997): 23–33. http://dx.doi.org/10.1177/003754979706800109.

Full text
Abstract:
Given the continued growth of the World-Wide Web, performance of Web sewers is becoming increasingly important. File caching can be used to reduce the time that it takes a Web server to respond to client requests, by storing the most popular files in the main memory of the Web sewer, and by reducing the volume of data that must be transferred between secondary storage and the Web server. In this paper, we use trace-driven simulation to evaluate the effects of various replacement, threshold, and partitioning policies on the performance of a Web sewer. The workload traces for the simulations come from Web server access logs, from six different Internet Web sewers. The traces represent three different orders of magnitude in sewer activity and two different orders of magnitude in time duration. The results from our simulation study show that frequency-based caching strategies, using a variation of the Least Frequently Used (LFU) replacement policy, perform the best for the Web sewer workload traces considered. Thresholding policies and cache partitioning policies for Internet Web servers do not appear to be effective.
APA, Harvard, Vancouver, ISO, and other styles
42

Leon, R. E. "THE WORLD OF INTERNET: A CLIENT‐SERVER ARCHITECTURE AND THE NEW GENERATION OF INFORMATION SERVERS." Online and CD-Rom Review 18, no. 5 (May 1994): 279–84. http://dx.doi.org/10.1108/eb024501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Zarkasi, Muhammad Irvan, Jon Endri, and Sarjana Sarjana. "Rancang Bangun Pengatur Suhu Dan Kelembaban Ruang Server Berbasis IoT." J-SAKTI (Jurnal Sains Komputer dan Informatika) 3, no. 2 (September 13, 2019): 178. http://dx.doi.org/10.30645/j-sakti.v3i2.138.

Full text
Abstract:
The development of information technology in this modern era has progressed very rapidly, many ways have been developed to store large amounts of data, one of which is to use a server. A server is a computer system that serves and controls client access that is connected to it. All activities that we do on the internet always involve the server. Servers play a very important role because of their heavy duty to serve clients. Therefore, the server may not experience interference. One of the disturbances that cause a damaged server is the temperature that is too hot so that this tool is made in order to prevent these problems. This tool is made to regulate the temperature and humidity of the server room that exceeds reasonable limits. This tool is made using Arduino Uno as a microcontroller, DHT11 as a temperature and humidity sensor, Ethernet shield as a link to the internet. This tool also uses the Blynk application as monitoring, from the results of reading temperature and humidity sensors on this device can reduce the temperature by 6˚C cooler when the temperature in the room is hot, in this case the tool functions as it should
APA, Harvard, Vancouver, ISO, and other styles
44

Mehra, A., D. Verma, and R. Tewari. "Policy-based Diffserv on Internet servers: the AIX approach." IEEE Internet Computing 4, no. 5 (2000): 75–80. http://dx.doi.org/10.1109/4236.877488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Sun, Xin, Ruben Torres, and Sanjay Rao. "Preventing DDoS attacks on internet servers exploiting P2P systems." Computer Networks 54, no. 15 (October 2010): 2756–74. http://dx.doi.org/10.1016/j.comnet.2010.05.021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Sheng, Jinfang, Jie Hu, Xiaoyu Teng, Bin Wang, and Xiaoxia Pan. "Computation Offloading Strategy in Mobile Edge Computing." Information 10, no. 6 (June 2, 2019): 191. http://dx.doi.org/10.3390/info10060191.

Full text
Abstract:
Mobile phone applications have been rapidly growing and emerging with the Internet of Things (IoT) applications in augmented reality, virtual reality, and ultra-clear video due to the development of mobile Internet services in the last three decades. These applications demand intensive computing to support data analysis, real-time video processing, and decision-making for optimizing the user experience. Mobile smart devices play a significant role in our daily life, and such an upward trend is continuous. Nevertheless, these devices suffer from limited resources such as CPU, memory, and energy. Computation offloading is a promising technique that can promote the lifetime and performance of smart devices by offloading local computation tasks to edge servers. In light of this situation, the strategy of computation offloading has been adopted to solve this problem. In this paper, we propose a computation offloading strategy under a scenario of multi-user and multi-mobile edge servers that considers the performance of intelligent devices and server resources. The strategy contains three main stages. In the offloading decision-making stage, the basis of offloading decision-making is put forward by considering the factors of computing task size, computing requirement, computing capacity of server, and network bandwidth. In the server selection stage, the candidate servers are evaluated comprehensively by multi-objective decision-making, and the appropriate servers are selected for the computation offloading. In the task scheduling stage, a task scheduling model based on the improved auction algorithm has been proposed by considering the time requirement of the computing tasks and the computing performance of the mobile edge computing server. Extensive simulations have demonstrated that the proposed computation offloading strategy could effectively reduce service delay and the energy consumption of intelligent devices, and improve user experience.
APA, Harvard, Vancouver, ISO, and other styles
47

Nazarevych, А. V., and R. A. Nazarevych. "GEODYNAMICS." GEODYNAMICS 2(11)2011, no. 2(11) (September 20, 2011): 216–18. http://dx.doi.org/10.23939/jgd2011.02.216.

Full text
Abstract:
The internet-accessible multi-user system of geodynamic monitoring data processing is presented. It is realized in the Java programming language as an interactive Web page which can be placed either on its own server of the awarding authority (Carpathian Branch of Subbotin name Institute of Geophysics of NAS of Ukraine) or on public Internet servers. Functionally the programs` complex consists of the following modules: module of receiving of geophysical information, database module, client modules, system administrator module.
APA, Harvard, Vancouver, ISO, and other styles
48

Fu, Yanxia, Yanli Ren, Guorui Feng, Xinpeng Zhang, and Chuan Qin. "Non-Interactive and Secure Data Aggregation Scheme for Internet of Things." Electronics 10, no. 20 (October 11, 2021): 2464. http://dx.doi.org/10.3390/electronics10202464.

Full text
Abstract:
The popularity of mobile devices in Internet of Things has brought great convenience to the lives of the people. Massive data generated in the IoT are outsourced and stored on cloud platforms so that data aggregation and analysis can be performed on the massive data. However, these data often contain sensitive information of mobile devices, so effective protection of mobile user privacy is the primary condition for further development of IoT. Most of the current data aggregation schemes require a lot of interactions between users, and thus this paper designs a non-interactive secure multidimensional data aggregation scheme. This scheme adopts an additive secret sharing technique to mask the shared data and send it to two non-colluding servers, and then the servers aggregate the ciphertext respectively. Different from the existing schemes, our proposed scheme achieves non-interaction between users, and the aggregation result is kept confidential to the server and supports mobile users offline. Finally, we perform an experimental evaluation which proves the effectiveness of our scheme.
APA, Harvard, Vancouver, ISO, and other styles
49

Lim, Mingyu, and Dongman Lee. "A Task-Based Load Distribution Scheme for Multi-Server-Based Distributed Virtual Environment Systems." Presence: Teleoperators and Virtual Environments 18, no. 1 (February 1, 2009): 16–38. http://dx.doi.org/10.1162/pres.18.1.16.

Full text
Abstract:
Multi-server-based distributed virtual environment (MSDVE) systems have become prevalent, supporting a large number of internet users. In MSDVEs, the load balancing among servers is an important issue to achieve system scalability. However, existing approaches must pay high migration overhead for the state transition of users or regions, thus the excessive holding time during load distribution makes it difficult for the system to keep the interactive performance acceptable. This paper aims to provide an efficient load distribution mechanism in which a group of servers takes charge of regions and shares region information among servers. The proposed mechanism dynamically classifies task types based on features of requested messages, and distributes each task fairly to neighboring servers. We have implemented the proposed mechanism extending our network framework for DVE, ATLAS, and our experiments show that the task distribution reduces both communication and processing overhead during load distribution without significant classification overhead.
APA, Harvard, Vancouver, ISO, and other styles
50

Lübben, Ralf, and Nico Misfeld. "Exploring the Measurement Lab Open Dataset for Internet Performance Evaluation: The German Internet Landscape." Electronics 11, no. 1 (January 5, 2022): 162. http://dx.doi.org/10.3390/electronics11010162.

Full text
Abstract:
The Measurement Lab (MLab) provides a large and open collection of Internet performance measurements. We make use of it to look at the state of the German Internet by a structured analysis, in which we carve out expressive results from the dataset to identify busy hours and days, the impact of server locations and congestion control protocols, and compare Internet service providers. Moreover, we examine the impact of the COVID-19 lockdown in Germany. We observe that only parts of the Internet show a performance degradation at the beginning of the lockdown and that a large impact in performance depends on the network the servers are located in. Furthermore, the evolution of congestion control algorithms is reflected by performance improvements. For our analysis, we focus on the busy hours. From the end-user perspective, this time is of most interest to identify if the network can support challenging services such as video streaming or cloud gaming at these intervals.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography